TECHNICAL FIELD
[0001] The present invention relates, in general, to network management and, more particularly,
to routing monitoring.
BACKGROUND OF THE INVENTION
[0002] Local Area Networks (LANs), Wide Area Networks (WAN), and the Internet connect businesses
and people across the world. Networks typically use routers to route data to the nodes
or connection points of the network. Routers are generally specialized computers that
forward messages to their respective destinations along many possible pathways via,
what the router may calculate as, an effective and efficient route. As traffic increases,
congestion may develop along any one or several such possible routes, communication
links go down or routers may fail. The router may then change preferred routing schemes
to accommodate the congestion or network failures (dead communication link or router).
[0003] Routers generally have input and output ports, for receiving and sending messages/packets,
a switching fabric of some kind, and a routing processor. During operation, the routing
processor controls routing hardware/software processes that examine the header information
of the message/packet and find the address where the data is being sent. The router
will then generally compare the network address against an internal database of addresses,
known as a routing table, that maintains a list of possible routes to that destination
address. Based on the particular Internet Protocol (IP) address to which the message/packet
is addressed, the message/packet is sent to the destination, whether the destination
is the final destination or whether it is the next router in the destination path.
[0004] The routers within a particular autonomous system (AS) may exchange routing information
internally (i.e., intra-domain routing) using any one of a variety of accepted routing
protocols, such as Routing Information Protocol (RIP), Open Shortest Path First protocol
(OSPF), Intermediate System to Intermediate System (ISIS), or the like. Routers that
participate in inter-domain routing (i.e., routing information exchanged between different
domains or AS) typically exchange information using Border Gateway Protocol (BGP).
BGP usually runs over a connection-oriented transport protocol, such as Transport
Control Protocol (TCP). Using this transport connection, BGP routers may exchange
BGP messages (i.e., update messages with announcements or withdrawals of Internet
Protocol (IP) prefixes, keep alive messages, and the like) that allow them to create
and update their routing tables. It should be noted that an IP prefix is an IP address
associated with a mask of valid bits. For example, a prefix, 130.29.0.0/16, means
only that the most significant 16 bits are valid.
[0005] In managing networks and network connections it is useful to monitor the routing
tables. By analyzing the changes in the routing tables, the state of the network or
networks may be determined. For example, when a communication link or a router stop
operating in particular areas of the network, the prefixes with paths that include
those failed networking elements may be withdrawn or deleted from the routing tables.
Routing tables may be monitored directly using Simple Network Management Protocol
(SNMP), Telnet, and/or peer sessions directly with the monitored router. A user may
then access the routing information from the monitored router either directly through
the SNMP/Telnet connections or indirectly through a Web server. The Web server generally
obtains the routing information from the SNMP/Telnet session but presents the information
through a Web access point. Web access is typically implemented as "Looking Glass"
software applications that provide a "looking glass" into the routing table of the
target router. Because the monitoring entity does not establish a direct connection
to the router, Web server access generally provides a much more securable means for
viewing the routing information than SNMP/Telnet. Therefore, SNMP/Telnet access is
typically limited to trusted users.
[0006] Internet Service Providers (ISPs) generally maintain AS that may be further interconnected
with various other AS. Public exchange points are the areas where multiple such ISPs
exchange routing and traffic information through routers along the edges of the AS,
referred to as edge routers. Historically, each edge router exchanges the routing
information with each other edge router both within its AS and within the bordering
AS. This process leads to many BGP sessions/connections to be made between the edge
servers. The set of these connections is referred to as the BGP mesh. Because each
router would typically need to connect with each other router, R
2 BGP connections generally result, where R is the total number of routers in the mesh.
One method that has been implemented to overcome the complexity of this BGP mesh is
to deploy route servers (RS).
[0007] An RS is a software application running on a router or another computer connected
to the network that communicates and exchanges route information with the AS' edge
servers. Under the RS' routing policies, routing information may be exchanged with
any other requesting router, including routers of the neighboring AS that are provided
for in the routing policy. By providing the more centralized access point for exchanging
and obtaining routing information, the number of connections or BGP sessions is substantially
reduced. Instead of R
2 BGP connections/sessions, because each router only needs to connect with the RS,
there is typically only R connections/sessions. Using an RS also generally allows
the user to capture a more complete picture of the BGP updates instead of a mere snapshot
of the routing information base (RIB) that is obtained through the direct access methods.
RS are typically deployed at the edges of the AS, where communication may occur with
routers external to the known network.
[0008] Another means for centralizing access to routing information is using a Route Reflector
(RR). Like an RS, an RR is a software application running on a router or another computer
connected to the network that communicates and exchanges route information. However,
RR do not generally have routing policies that dictate which requesting routers or
entities can or cannot access the routing information. RR basically repeats all of
the routing information that it has to any accessing entity. RR are primarily used
to reduce the mesh within AS, while RS are generally used to allow exchange routing
information between multiple AS.
[0009] The problem with the current techniques is that they each require a BGP session with
the monitored router, RS, and/or RR. Establishing and running a BGP session with the
monitored router drains the monitored router's central processing unit (CPU) cycles.
A router's performance generally degrades as the number of open BGP sessions increases.
Therefore, because an RS is typically configured as a peer in every monitored router's
configuration file, these techniques are generally not very well-suited for passively
monitoring routing information. The establishment of such BGP sessions is very invasive
creating a management problem for the routers. In addition, if, for some reason, overloaded
RS begin crashing, the monitoring routers attempt to reestablish the BGP sessions.
Reestablishing the BGP sessions causes extensive updates to occur because the monitored
router sends all of its routing information to the RS again. For edge routers, this
updating may result in the monitored router sending over 100,000 prefixes to the RS.
[0010] Additionally, gathering routing information in a session between the monitoring system
and the monitored router only gathers the information that relates to the connection
between those two devices. If a BGP session between a monitored router and another
router goes down, there is generally no way to determine what caused the failure.
As the BGP session goes down, the monitored session may provide a flood of withdraw
signals, as well as multiple announcements of IP prefixes arriving as a result of
a BGP session going down. However, there is no way to determine whether the problem
is with the TCP session or BGP session. Additionally, the monitored system maybe overloaded
causing the system to stop sending "keep alive" message to monitored router. Ceasing
the "keep alive" messages may then cause a BGP session reset by the monitored router
resulting again in a flood of prefix announcements when the BGP session is reestablished,
as discussed above. Consequently, the announcements caused by reestablishing the BGP
session may lead to further overloading of other monitored stations/routers. Overstressed
monitored stations could then cause BGP sessions to fail with other monitored routers
creating a domino effect of reestablishing multiple BGP sessions.
[0011] Many current monitoring systems utilize public domain routing software, such as Zebra,
to obtain and monitor routing information. Zebra is a routing software that captures
BGP traffic via established BGP sessions with monitored routers and reconstructs routing
tables based on provided routing information. Zebra may be used to implement a router,
RS, or RR; therefore, it leverages that functionality to obtain the routing information.
Zebra may establish BGP sessions with one or more of the routers, route servers, or
Route Reflectors and obtain routing information. Thus, monitoring the router using
Zebra also decreases the efficiency of that router.
[0012] Additional means for gathering routing information have been employed using line
taps or packet sniffers. Taps and sniffers are devices that actually tap into a communication
line between two or more routers. These devices essentially eavesdrop on the communication
taking place between different routers. Such tapping methods typically capture the
routing information and display it as formatted BGP data. Similar tapping methods
are used in Network Intrusion Detection Systems (NIDS), which use sophisticated analysis
engines to detect system attacks/intrusions including attacks made at the BGP level.
While such tapping/sniffing methods allow for passively capturing or recovering routing
information without establishing a BGP session with the monitored routers, issues
such as data security and ability to trap and compile information for all of the data
passing through the communications lines arise.
BRIEF SUMMARY OF THE INVENTION
[0014] According to an aspect of the present invention, there is provided a routing monitor
according to claim 1.
[0015] According to another aspect of the present invention, there is provided a method
according to claim 9.
[0016] Further representative embodiments of the present invention relate to a computer
program product having a computer readable medium with computer program logic recorded
thereon, the computer program product comprising code for re-assembling routing protocol
messages received from an eavesdropping device between two routers and code for emulating
a routing protocol session with a network monitoring device.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] FIGURE 1 is a block diagram illustrating a network constructed having a route server
providing routing information on communication between two servers to a looking glass
Web server;
[0018] FIGURE 2 is a block diagram illustrating a network with a network monitor configured
according to one embodiment of the present invention;
[0019] FIGURE 3 is a block diagram illustrating an additional embodiment of the present
invention monitoring routers; and
[0020] FIGURE 4 is a block diagram detailing a network monitor system configured according
to an embodiment of the present invention.
DETAILED DESCRIPTION
[0021] FIGURE 1 is a block diagram illustrating network 10 constructed having route server
100 providing routing information on router 101 and router 102 to looking glass Web
server 103. As shown in FIGURE 1, router 101 and 102 establish BGP sessions with route
server 100 in order to send its routing information. Looking glass Web server 103
is then able to provide users access to the routing information collected and stored
on route server 100. Therefore, in addition to the processing cycles that routers
101 and 102 use to perform routing between themselves and any other peering router,
routers 101 and 102 expend additional processing cycles connecting and communicating
with route server 100, thus, decreasing their overall efficiency.
[0022] FIGURE 2 is a block diagram illustrating network 20 with network monitor 200 configured
according to one embodiment of the present invention. Unlike the system in network
10, network monitor 200 monitors the communication between routers 201 and 202 through
TAP 203 without requiring a separate BGP session/connection with either or both of
routers 201 and 202.
[0023] Similarly to network 10, network 20 is configured with route server 205 providing
access to the routing information via Looking Glass Web server 206. However, as TAP
203 eavesdrops on the data packets being communicated between peering routers 201
and 202, BGP proxy 204 reassembles the TCP connection information and the BGP session
data and updates therein, and then emulates a BGP session with route server 205 using
the BGP sessions information trapped from the communication between peering routers
201 and 202. Thus, route server 205 believes that it is physically in communication
with both of routers 201 and 202, without there being an actual drain on routers 201
and 202's processor resources.
[0024] It should be noted that typical RS generally listen to one well-known port (usually
port 179). However, embodiments of the present invention may generally operate with
RS that are capable of listening on multiple different ports. This allows the RS to
maintain simultaneous connections with multiple BGP session streams emulated from
a BGP proxy, such as BGP proxy 204 shown in FIGURE 2. Similarly, BGP proxies configured
according to various embodiments of the present invention may use network interface
cards (NIC) that support multiple addresses or establishing multiple TCP connections
on different ports.
[0025] Although FIGURE 2 illustrates an embodiment of the present invention monitoring a
single peering session, additional embodiments of the present invention may monitor
any desired number of peering sessions. FIGURE 3 is a block diagram illustrating an
additional embodiment of the present invention monitoring routers 303 - 305. Integrated
network monitor 300 includes BGP proxy 306, route server 307, and Looking Glass Web
interface 308. Such an integrated embodiment may provide a compact form. TAP 301 taps
into the peering communication session between routers 303 and 305 and transmits the
captured routing information to integrated network monitor 300. TAP 302 taps into
the peering communication session between routers 303 and 304 and also transmits the
captured/copied routing information to integrated network monitor 300.
[0026] The various embodiments of the present allow wider deployment of router monitoring
devices because they teach non-invasive information capturing and may not require
router configuration changes. Furthermore, because no extra BGP sessions are set up
between the monitored routers and the monitoring system, no extra CPU cycles are used
in the monitored routers.
[0027] An additional by-product of the embodiments of the present invention is that it allows
for detection of router attacks. Current monitor methods typically do not show scans
or attacks against routing protocols because routers typically discard such unexpected
data packets with their routing protocol messages unless a complex, extremely CPU
intensive debugging process is activated. However, because the embodiments of the
present invention generally capture all of the data packets in the communication sessions
between routers, the various embodiments of the network monitor may then be capable
of logging routing information from such unexpected origination or destination addresses
that would otherwise be discarded by the monitored router.
[0028] FIGURE 4 is a block diagram detailing network monitor system 40 configured according
to an embodiment of the present invention. Tapping module 401 includes a physical
interface tap, TAP 404, and TAP Interface (TI) module 405. TI module 405 captures
traffic using TAP 404, which may be a physical line tap or a built in means, such
as a mirroring port, and filters out non-routing information. It should be noted here
that mirroring ports of existing routers/switches typically copy all traffic and therefore
may have problems keeping up with the received levels of traffic because aggregate
traffic volume is generally higher than mirroring port capacity. Today, capturing
traffic at a speed of up to 100 Mbit/sec could be problematic. It is important, therefore,
that, in select embodiments of the present invention, TAP 404 have real-time filtering
and forwarding capabilities.
[0029] BGP data directed to the monitored router's IP address is forwarded to Transport
Reconstruction (TR) module 406 of network monitor 400 for transport session data reconstruction.
TR module 406 reconstructs TCP data streams and deals with packets that are out of
order, packet retransmissions, and the like, in a timely fashion, i.e., it cannot
wait indefinitely when a packet is missing. TR module 406 should handle packets missed
by the TAP because the apparatus is non-intrusive and, therefore, cannot request retransmission
of a missing packet. It should be noted here that BGP uses a maximum packet size of
4 kBytes while media such as Ethernet generally allows payloads of less than 1.5 kBytes.
In such cases, 4 kB BGP messages may be fragmented into smaller IP packets. TI module
405 should have the capability to filter data packets based on filter attributes,
such as IP address, protocol IDs, and destination ports. If the filter values of a
captured packet matches a previously user-configured filters, the packet is forwarded
to TR module 406; otherwise it is dropped. The TI module 405 reduces data traffic
to the data needed for reconstructing TCP sessions associated with the exchange of
routing information. This is to provide a scaleable solution for high-speed links.
It should be noted here that some of the traffic destined to a particular router may
not carry routing information, such as SNMP or Telnet. This data may be either dropped
at TI module 405 or at TR module 406 depending on the sophistication of TI module
405's filtering capability. In such cases, TI module 405 may also filter based on
a particular TCP port.
[0030] In additional implementations, TI module 405's functionality may reside in a separate
element that also houses TAP 404. TAP 404 may also aggregate multiple physical TAP's
serving each individual interface on the router's line card as disclosed in commonly
assigned, co-pending patent application Attorney Docket Number 10040474-1, entitled,
"ASSISTED PORT MONITORING WITH DISTRIBUTED FILTERING." As previously discussed, TR
module 406 may also detect intrusions. If, for example, a router typically accepts
only TCP connections from specifically configured routers (peers) and usually drops
other competing TCP connection attempts that are directed to BGP port 179 without
logging those attempts. Unless the router's configuration enables specific debugging/logging,
such attempts will not be observed. TR module 406 could be configured to accept only
traffic destined for the previously configured, monitored routers' IP addresses and
log any other attempts to establish connection. Screening and logging of TCP/IP traffic
at this level could be even more detailed than when this is done by the router itself.
It should be noted that the reconstruction of the transport protocol should take care
of missing, and later retransmitted packets and out of order packets that may occur
especially when dealing with multi-hop BGP, i.e., when other routers separate the
peering routers.
[0031] TR module 406, after reconstructing part of the TCP data stream, passes data to BGP
Message Reconstruction (BMR) module 407 to assemble the BGP message and ensures that
is complete. Incomplete messages may be logged locally as missing or malformed BGP
messages. Depending on configuration of the apparatus, BMR 407 forwards the BGP message
either to Routing Reconstruction (RR) module 408 or BGP Session Emulation (BSE) module
410. RR module 408 may be used when the apparatus provides an integrated solution
and builds a Routing Information Base (RIB) according to RFC 1771.
The snapshots of the RIB, as well as time stamped BGP update information, may be stored
in local disk 412. In this case, the invention may work as a RS that, via Web Interface
(WI) module 408, provides routing information to Web users as Looking Glass Applications
do today. In the case where the invention provides a BGP proxy solution, BMR module
407 forwards the reconstructed BGP messages to BSE module 410. Reconstructed BGP messages
coming from a specific monitored router are then sent over a specific peering session
that is established with external route server 411 or replicated into multiple peering
sessions if more than one route server is interested in receiving the routing information
of a specific router. BSE module 410 may use either different IP addresses when talking
to a specific RS or different TCP ports at the RS to distinguish between different
peering sessions representing different monitored routers.
[0032] The BGP session information includes time stamps that get recorded in addition to
the BGP update information into local disk 412. Unlike Zebra, which must break off
the BGP session to save any BGP information is has, the reconstructed BGP updates
with all of the time stamps accurately recorded thereon are stored into local disk
412. Therefore, two conflicting updates may be resolved by embodiments of the present
invention by comparing time stamps and knowing that there were no interim updates
that occurred when Zebra would have been storing its data.
1. A routing monitor (200, 300, 400) comprising:
at least one communication tap (203, 301, 302, 404), wherein each of said at least
one communication taps is connectable in a line of communication between two routers
(201, 202, 303,304,305,402,403);and
a protocol emulator (204, 306, 407, 410) arranged to:
reconstruct transport protocol messages captured by said at least one communication
tap including taking care of missing and out of order packets;
assemble routing protocol messages from the reconstructed transport protocol messages;
and,
establish a routing protocol session with a network monitoring device by sending said
reassembled routing protocol messages to the monitoring device.
2. The routing monitor (200, 300, 400) of claim 1 further comprising:
a database (412) for storing said reassembled routing protocol messages.
3. The routing monitor (200, 300, 400) of claim 1 further comprising:
a Web server (103, 206), wherein said Web server converts said reassembled routing
protocol messages into a Web accessible format; and
a Web interface 308, 409 for displaying said reassembled routing protocol messages
in said Web accessible format.
4. The routing monitor (200, 300, 400) of claim 1 further comprising:
a transport protocol module (406) in communication with said at least one communication
tap (203, 304, 305, 306, 402, 403), wherein said transport protocol module reassembles
transport protocol messages captured by said at least one communication tap.
5. The routing monitor (200, 300, 400) of claim 4 wherein said protocol emulator (204,
306, 407, 410) opens a transport protocol connection and establishes routing protocol
session with said network monitoring device using said reassembled transport protocol
messages.
6. The routing monitor (200, 300, 400) of claim 1 further comprising:
a routing reconstruction module (408) for building a routing information base (RIB)
using said reassembled routing protocol messages.
7. The routing monitor (200, 300, 400) of claim 1 further comprising:
a table reconstruction module for building a routing table using said reassembled
routing protocol messages.
8. The routing monitor (200, 300, 400) of claim 1 wherein said protocol emulator comprises:
a routing protocol reconstruction module (407) for reassembling said captured routing
protocol messages; and
a protocol session emulator (410) for establishing routing protocol session to said
network monitoring device and by transmitting appropriate ones of said reassembled
routing protocol messages to said network monitoring device.
9. A method for monitoring routing information in a network comprising:
tapping into a communication line between two network routers (201, 202, 303, 304,
305, 402, 403);
replicating packets transmitted on said communication line between said two network
routers;
transmitting said replicated packets to a protocol emulator (204, 306);
reconstructing transport protocol messages from said replicated packets including
taking care of missing and out of order packets;
assembling routing protocol messages from the reconstructed transport protocol messages;
and
establishing a routing protocol session with a network monitoring device (200, 300,
400) by sending said reassembled routing protocol messages to the monitoring device.
10. The method of claim 9 further comprising:
establishing a transport protocol session with said network monitoring device (200,
300, 400).
1. Eine Routingüberwachungseinrichtung (200, 300, 400), die folgende Merkmale aufweist:
zumindest einen Kommunikationsabgriff (203, 301, 302, 404), wobei jeder des zumindest
einen Kommunikationsabgriffs in eine Kommunikationsleitung zwischen zwei Router (201,
202, 303, 304, 305, 402, 403) schaltbar ist; und
einen Protokollemulator (204, 306, 407, 410), der angeordnet ist, um:
Transportprotokollmeldungen zu rekonstruieren, die durch den zumindest einen Kommunikationsabgriff
erfasst werden, was das Erledigen fehlender Pakete und solcher außer der Reihe umfasst;
Zusammenstellen von Routingprotokollmeldungen aus den rekonstruierten Transportprotokollmeldungen;
und
Einrichten einer Routingprotokollsitzung mit einer Netzwerküberwachungsvorrichtung
durch Senden der neu zusammengestellten Routingprotokollmeldungen zu der Überwachungsvorrichtung.
2. Die Routingüberwachungseinrichtung (200, 300, 400) gemäß Anspruch 1, die ferner folgendes
Merkmal aufweist:
eine Datenbank (412) zum Speichern der neu zusammengestellten Routingprotokollmeldungen.
3. Die Routingüberwachungseinrichtung (200, 300, 400) gemäß Anspruch 1, die ferner folgende
Merkmale aufweist:
einen Web-Server (103, 206), wobei der Web-Server die neu zusammengestellten Routingprotokollmeldungen
in ein Web-zugreifbares Format umwandelt; und
eine Web-Schnittstelle (308, 409) zum Anzeigen der neu zusammengestellten Routingprotokollmeldungen
in dem Web-zugreifbaren Format.
4. Die Routingüberwachungseinrichtung (200, 300, 400) gemäß Anspruch 1, die ferner folgendes
Merkmal aufweist:
ein Transportprotokollmodul (406) in Kommunikation mit dem zumindest einen Kommunikationsabgriff
(203, 304, 305, 306, 402, 403), wobei das Transportprotokollmodul die Transportprotokollmeldungen
neu zusammenstellt, die durch den zumindest einen Kommunikationsabgriff erfasst werden.
5. Die Routingüberwachungseinrichtung (200, 300, 400) gemäß Anspruch 4, bei der der Protokollemulator
(204, 306, 407, 410) eine Transportprotokollverbindung öffnet und eine Routingprotokollsitzung
mit der Netzwerküberwachungsvorrichtung unter Verwendung der neu zusammengestellten
Transportprotokollmeldungen einrichtet.
6. Die Routingüberwachungseinrichtung (200, 300, 400) gemäß Anspruch 1, die ferner folgendes
Merkmal aufweist:
ein Routingrekonstruktionsmodul (408) zum Aufbauen einer Routinginformationsbasis
(RIB) unter Verwendung der neu zusammengestellten Routingprotokollmeldungen.
7. Die Routingüberwachungseinrichtung (200, 300, 400) gemäß Anspruch 1, die ferner folgendes
Merkmal aufweist:
ein Tabellenrekonstruktionsmodul zum Aufbauen einer Routingtabelle unter Verwendung
der neu zusammengestellten Routingprotokollmeldungen.
8. Die Routingüberwachungseinrichtung (200, 300, 400) gemäß Anspruch 1, bei der der Protokollemulator
folgende Merkmale aufweist:
ein Routingprotokollrekonstruktionsmodul (407) zum Neuzusammenstellen der erfassten
Routingprotokollmeldungen; und
einen Protokollsitzungsemulator (410) zum Einrichten einer Routingprotokollsitzung
zu der Netzwerküberwachungsvorrichtung und durch Übertragen geeigneter der neu zusammengestellten
Routingprotokollmeldungen zu der Netzwerküberwachungsvorrichtung.
9. Ein Verfahren zum Überwachen von Routinginformationen in einem Netzwerk, das folgende
Schritte aufweist:
Abgreifen in eine Kommunikationsleitung zwischen zwei Netzwerkroutern (201, 202, 303,
304, 305, 402, 403);
Replizieren von Paketen, die auf der Kommunikationsleitung zwischen den zwei Netzwerkroutern
übertragen werden;
Übertragen der replizierten Pakete zu einem Protokollemulator (204, 306);
Rekonstruieren von Transportprotokollmeldungen aus den replizierten Paketen, was das
Erledigen fehlender Pakete und solcher außer der Reihe umfasst;
Erzeugen von Routingprotokollmeldungen aus den rekonstruierten Transportprotokollmeldungen;
und
Einrichten einer Routingprotokollsitzung mit einer Netzwerküberwachungsvorrichtung
(200, 300, 400) durch Senden der neu zusammengestellten Routingprotokollmeldungen
zu der Überwachungsvorrichtung.
10. Das Verfahren gemäß Anspruch 9, das ferner folgenden Schritt aufweist:
Einrichten einer Transportprotokollsitzung mit der Netzwerküberwachungsvorrichtung
(200, 300, 400).
1. Dispositif de surveillance de routage (200, 300, 400) comprenant :
au moins une connexion de communication (203, 301, 302, 404), dans lequel chacune
desdites au moins une connexion de communication peut être connectée dans une ligne
de communication entre deux routeurs (201, 202, 303, 304, 305, 402, 403) ; et
un émulateur de protocole (204, 306, 407, 410) disposé pour :
reconstruire des messages de protocole de transport capturés par ladite au moins une
connexion de communication comprenant la prise en charge de paquets manquants et en
mauvais état ;
assembler les messages de protocole de routage à partir des messages de protocole
de transport reconstruits ; et,
établir une session de protocole de routage avec un dispositif de surveillance du
réseau en envoyant lesdits messages de protocole de routage rassemblés au dispositif
de surveillance.
2. Dispositif de surveillance de routage (200, 300, 400) selon la revendication 1 comprenant
en outre :
une base de données (412) pour stocker lesdits messages de protocole de routage rassemblés.
3. Dispositif de surveillance de routage (200, 300, 400) selon la revendication 1 comprenant
en outre :
un serveur web (103, 206), dans lequel ledit serveur web convertit lesdits messages
de protocole de routage rassemblés en un format accessible au web ; et
une interface web (308, 409) pour afficher lesdits messages de protocole de routage
rassemblés dans ledit format accessible au web.
4. Dispositif de surveillance de routage (200, 300, 400) selon la revendication 1 comprenant
en outre :
un module de protocole de transport (406) en communication avec ladite au moins une
connexion de communication (203, 304, 305, 306, 402, 403), dans lequel ledit module
de protocole de transport rassemble des messages de protocole de transport capturés
par ladite au moins une connexion de communication.
5. Dispositif de surveillance de routage (200, 300, 400) selon la revendication 4 dans
lequel ledit émulateur de protocole (204, 306, 407, 410) ouvre une connexion de protocole
de transport et établit une session de protocole de routage avec ledit dispositif
de surveillance du réseau en utilisant lesdits messages de protocole de transport
rassemblés.
6. Dispositif de surveillance de routage (200, 300, 400) selon la revendication 1 comprenant
en outre :
un module de reconstruction de routage (408) pour construire une base d'informations
de routage (RIB) en utilisant lesdits messages de protocole de routage rassemblés.
7. Dispositif de surveillance de routage (200, 300, 400) selon la revendication 1 comprenant
en outre :
un module de reconstruction de table pour construire une table de routage en utilisant
lesdits messages de protocole de routage rassemblés.
8. Dispositif de surveillance de routage (200, 300, 400) selon la revendication 1 dans
lequel ledit émulateur de protocole comprend :
un module de reconstruction de protocole de routage (407) pour rassembler lesdits
messages de protocole de routage capturés ; et
un émulateur de session de protocole (410) pour établir une session de protocole de
routage sur ledit dispositif de surveillance du réseau et en transmettant les messages
appropriés parmi lesdits messages de protocole de routage rassemblés audit dispositif
de surveillance du réseau.
9. Procédé servant à surveiller des informations de routage dans un réseau comprenant
:
une connexion dans une ligne de communication entre deux routeurs de réseau (201,
202, 303, 304, 305, 402, 403) ;
la réplication des paquets transmis sur ladite liaison de communication entre lesdits
deux routeurs de réseau ;
la transmission desdits paquets répliqués à un émulateur de protocole (204, 306) ;
la reconstruction des messages de protocole de transport à partir desdits paquets
répliqués comprenant la prise en charge des paquets manquants et en mauvais état ;
l'assemblage des messages de protocole de routage à partir des messages de protocole
de transport reconstruits ; et
l'établissement d'une session de protocole de routage avec un dispositif de surveillance
du réseau (200, 300, 400) en envoyant lesdits messages de protocole de routage rassemblés
au dispositif de surveillance.
10. Procédé selon la revendication 9 comprenant en outre :
l'établissement d'une session de protocole de transport avec ledit dispositif de surveillance
de réseau (200, 300, 400).